Methods, devices, and systems for management of a cloud computing environment for use by a software application. The cloud computing environment may be an N-tier environment. Multiple cloud providers may be used to provide the cloud computing environment.
|
1. A method for managing a tiered cloud computing environment configuration in which each tier of the cloud computing environment configuration is characterized by tier-specific compute functions, the method comprising:
sending, from a computer system to compute resources of a tiered cloud computing environment in which the tiered cloud computing environment configuration is to be instantiated, provisioning information including types of servers to launch in each tier and security requirement data for the tier-specific compute functions in the cloud computing environment, the provisioning information being sent in a single file in response to an initialization event that causes the tiers of the cloud computing environment to be made available to a software application according to a cloud environment configuration specified by the initialization event; and
subsequently sending, by the computer system to the compute resources of the tiered cloud computing environment, software application data, which upon receipt by the compute resources of the cloud computing environment causes the software application to execute over the tier-specific compute functions of the cloud computing environment configuration.
13. A method, comprising:
instantiating, according to provisioning information sent responsive to an initialization event, a tiered cloud computing environment configuration in which each tier of the cloud computing environment configuration is characterized by tier-specific compute functions of a tiered cloud computing environment, the provisioning information including types of servers to launch in each tier and security requirement data for the tier-specific compute functions in the cloud computing environment;
executing a software application over the tier-specific compute functions of the cloud computing environment configuration according to software application data provided to the compute resources of the tiered cloud computing environment;
transmitting from the cloud computing environment configuration environment data that represents a current state of the cloud computing environment configuration; and
receiving a cloud environment adjustment event for the cloud computing environment configuration, the cloud environment adjustment event configured to cause an adjusted cloud environment configuration to be made available to the software application;
wherein the initialization event causes the tiers of the cloud computing environment to be made available to the software application and specifies a requested first cloud computing environment initial configuration and a requested second cloud computing environment initial configuration, and the cloud environment adjustment event includes a requested first cloud computing environment adjusted configuration and a requested second cloud computing environment adjusted configuration.
9. A method, comprising:
instantiating, according to provisioning information sent responsive to an initialization event, a tiered cloud computing environment configuration in which each tier of the cloud computing environment configuration is characterized by tier-specific compute functions of a tiered cloud computing environment, the provisioning information including types of servers to launch in each tier and security requirement data for the tier-specific compute functions in the cloud computing environment;
executing a software application over the tier-specific compute functions of the cloud computing environment configuration according to software application data provided to the compute resources of the tiered cloud computing environment;
transmitting from the cloud computing environment configuration environment data that represents a current state of the cloud computing environment configuration; and
receiving a cloud environment adjustment event for the cloud computing environment configuration, the cloud environment adjustment event configured to cause an adjusted cloud environment configuration to be made available to the software application;
wherein the initialization event causes the tiers of the cloud computing environment to be made available to the software application and specifies a requested first cloud computing environment initial configuration and a requested second cloud computing environment initial configuration, the requested first cloud computing environment initial configuration being made available by a first cloud provider and the requested second cloud computing environment initial configuration being made available by a second cloud provider.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
10. The method of
11. The method of
12. The method of
14. The method of
|
This is a CONTINUATION of U.S. application Ser. No. 16/447,052, filed Jun. 20, 2019, which is a CONTINUATION of U.S. application Ser. No. 15/815,442, filed Nov. 16, 2017, now U.S. Pat. No. 10,454,763, issued Oct. 22, 2019, which is a CONTINUATION of U.S. application Ser. No. 14/719,112, filed May 21, 2015, now U.S. Pat. No. 9,853,861, issued Dec. 26, 2017, which is a CONTINUATION of U.S. application Ser. No. 13/572,537, filed Aug. 10, 2012, now U.S. Pat. No. 9,043,751, issued May 26, 2015, which is a CONTINUATION of U.S. application Ser. No. 12/247,654, filed Oct. 8, 2008, now U.S. Pat. No. 8,271,974, issued Sep. 18, 2012, the entire contents of each of which are expressly incorporated by reference.
The present methods, devices, and systems relate generally to the fields of computers, information technology, virtualization, and cloud computing. More particularly, the present methods, devices, and systems relate to management of a cloud computing environment for use by a software application.
Virtualization technology facilitates the operation of multiple virtual servers within a single physical server system, such that each virtual sever may operate within its own unique system environment (e.g., operating system, applications). From a user's perspective, virtual servers may appear identical to a physical server. Users of the virtual server may be able to install any operating system, application, etc. on the virtual server without impacting users of other virtual servers operating within the same physical server system.
Cloud computing may be used to leverage virtualization of the resources of, for example, datacenters. Cloud providers, which may operate resources such as datacenters and/or other information technology-related capabilities, may facilitate the use of such resources by providing users (which may be remote to the cloud provider) with access to their resources. These potentially accessible resources may be collectively referred to as a “cloud computing environment” or a “cloud environment.”
Embodiments of the present methods for managing a cloud computing environment for use by a software application may include determining a requested initial cloud environment based on user-defined provisioning information, sending an initialization event based on the requested initial cloud environment, sending application data that is configured to cause the application to begin execution in the initial cloud environment configuration, receiving monitoring environment data that represents a current cloud environment state, determining a requested adjusted cloud environment based on the monitoring environment data, and sending a cloud environment adjustment event based on the requested adjusted cloud environment.
An “application” may include “application software,” which may contain one or more units of functionality (e.g., a web portal with email functionality, database programs, word processing programs, accounting programs, inventory management programs, numerical analysis programs). An “application” may also include “services,” which may contain one logical unit of functionality (e.g., an autonomous unit that is responsible for a transformation, storage and/or retrieval of data, such as a database management service or a database API service).
The requested initial cloud environment may be an N-tier computing environment. The initialization event may be configured to cause an initial cloud environment configuration to be made available to an application. The requested adjusted cloud environment may be an N-tier computing environment. The cloud environment adjustment event may be configured to cause an adjusted cloud environment configuration to be made available to the application.
In some embodiments, the application data may comprise computer-usable code defining the application to be executed in the initial cloud configuration. In some embodiments, the computer-usable code defining the application may not be present within the cloud environment prior to the sending of the application data. In some embodiments, the initial cloud configuration, the adjusted cloud configuration, and the computer-usable code defining the application are removed after execution of the application is complete. In some embodiments, the computer-usable code defining the application may be configured to be executed in a non-cloud computing environment (e.g., a physical computer environment), and may execute within the initial cloud configuration without being modified or optimized for use in a cloud computing environment.
In some embodiments, the initial cloud environment configuration may include an initial first cloud configuration that is made available by a first cloud provider. The requested adjusted cloud environment configuration may include a requested second cloud adjusted configuration. The adjusted cloud environment configuration may include an adjusted second cloud configuration. The cloud environment adjustment event may include a second cloud adjustment event based on the requested second cloud adjusted configuration. The second cloud adjustment event may be configured to cause the adjusted second cloud configuration to be made available by a second cloud provider.
In some embodiments, the requested initial cloud environment may include a requested first cloud initial configuration and a requested second cloud initial configuration. The initial cloud environment configuration may include an initial first cloud configuration and an initial second cloud configuration. The initialization event may include a first cloud initialization event based on the requested first cloud initial configuration and a second cloud initialization event based on the requested second cloud initial configuration. The first cloud initialization event may be configured to cause the initial first cloud configuration to be made available by a first cloud provider. The second cloud initialization event may be configured to cause the initial second cloud configuration to be made available by a second cloud provider.
In some embodiments, the requested adjusted cloud environment configuration may include a requested first cloud adjusted configuration and a requested second cloud adjusted configuration. The adjusted cloud environment configuration may include an adjusted first cloud configuration and an adjusted second cloud configuration. The cloud environment adjustment event may include a first cloud adjustment event based on the requested first cloud adjusted configuration, and a second cloud adjustment event based on the requested second cloud adjusted configuration. The first cloud adjustment event may be configured to cause the adjusted first cloud configuration to be made available by the first cloud provider. The second cloud adjustment event is configured to cause the adjusted second cloud configuration to be made available by the second cloud provider.
In some embodiments, the user-defined provisioning information may be determined using a needs analysis algorithm and/or a user input received from a user interface.
In some embodiments, the user-defined provisioning information may include geographic data. In some embodiments, the user-defined provisioning information may include service level agreement data.
Some embodiments of the present methods may also include forecasting an optimal cloud environment for future use with the application. In some embodiments, the forecasting the optimal cloud environment may be based on the monitoring environment data.
Some embodiments of the present methods may also include forecasting a future cost associated with executing the application. In some embodiments, the forecasting the future cost may be based on the monitoring environment data. In some embodiments, the forecasting the future cost may include using service level agreement data.
Some embodiments of the present methods may also include receiving security information, determining a requested security action based on the security information, and/or sending a security event based on the requested security action.
Embodiments of the present systems for managing a cloud computing environment for use by a software application may include a processor in communication with a memory. The memory may store processor-executable program code. Embodiments of the system may be configured to be operative in conjunction with the processor-executable program code to perform any of the present methods described above.
Embodiments of the present computer readable media may have computer usable program code executable to perform operations for managing a cloud computing environment for use by a software application. Some embodiments may have computer usable program code executable to perform any of the present methods described above.
Embodiments of the present first computer readable media may have first computer usable program code that may be executable to install second computer usable program code on a second computer readable medium, where the second computer usable program code is executable to perform operations for managing a cloud computing environment for use by a software application. In some embodiments, the second computer usable program code may be executable to perform any of the present methods described above.
Any embodiment of any of the present methods, devices (e.g., computer readable media), and systems may consist of or consist essentially of—rather than comprise/include/contain/have—the described functions, steps and/or features. Thus, in any of the claims, the term “consisting of” or “consisting essentially of” may be substituted for any of the open-ended linking verbs recited above, in order to change the scope of a given claim from what it would otherwise be using the open-ended linking verb.
The term “send” and its variations are defined as including transmitting, both directly and indirectly (e.g., passing through intermediate components), and sending, both directly and indirectly. Similarly, the term “communicate” and its variation are defined as including both direct communication and indirect communication.
The term “server” includes virtual servers and physical servers. The term “computer system” includes virtual computer systems and physical computer systems.
The terminology “based on” denotes a relationship or dependency, but is not limited to situations where the relationship or dependency is exclusive. For example, “X is based on Y” is not limited to a relationship where X is equal to Y or where X is equal to a constant time Y. Instead, the determination of X is dependant on Y, but there may be other variables involved in the determination of X.
The terms “comprise” (and any form of comprise, such as “comprises” and “comprising”), “have” (and any form of have, such as “has” and “having”), “include” (and any form of include, such as “includes” and “including”) and “contain” (and any form of contain, such as “contains” and “containing”) are open-ended linking verbs. Thus, a method comprising certain steps is a method that includes at least the recited steps, but is not limited to only possessing the recited steps. Likewise, a device or system comprising certain elements includes at least the recited elements, but is not limited to only possessing the recited elements.
Similarly, a computer readable medium “comprising” computer usable program code for performing certain steps is a computer readable medium that has computer usable instructions for implementing at least the recited steps, but also covers media having computer usable instructions for implementing additional, unrecited steps. Further, a computer system that is configured to perform at least certain functions is not limited to performing only the recited functions, and may be configured in a way or ways that are not specified provided the system is configured to perform the recited functions.
The terms “a” and “an” are defined as one or more than one, unless this application expressly requires otherwise. The term “another” is defined as at least a second or more.
The following drawings illustrate by way of example and not limitation. Identical reference numerals do not necessarily indicate an identical structure, system, or display. Rather, the same reference numeral may be used to indicate a similar feature or a feature with similar functionality. Every feature of each embodiment is not always labeled in every figure in which that embodiment appears, in order to keep the figures clear.
In one aspect, the present disclosure provides embodiments that are methods for managing a cloud computing environment for use by a software application. In another aspect, the present disclosure provides embodiments that are systems for managing a cloud computing environment for use by a software application. Another aspect of the present disclosure provides computer readable media having computer usable program code executable to perform operations for managing a cloud computing environment for use by a software application. Yet another aspect of the present disclosure provides first computer readable media having first computer usable program code that is executable to install second computer usable program code on a second computer readable medium, where the second computer usable program code is executable to perform operations for managing a cloud computing environment for use by a software application.
An embodiment of a present method for managing a cloud computing environment for use by a software application is depicted in
Application cloud environment configuration 110 may include an N-tier computing environment that is made available to the application by cloud environment 100, and may be dependent on information included in cloud environment initialization event 210. Cloud environment initialization event 210 may cause application cloud environment configuration 110 that includes an environment having any number of tiers (e.g., logical groupings of components directed to a general type of functionality) to be made available. For example, cloud environment initialization event 210 may be configured to cause the availability of application cloud environment configuration 110 that may include an environment that contains a presentation tier, an application tier (e.g., a logic or business logic tier), and a database tier. Other configurations of cloud environment initialization event 210 may cause the availability of application cloud environment configuration 110 that may include an environment containing 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20 or more tiers.
In some embodiments, the sending of cloud environment initialization event 210 to cloud environment 100 may comprise the passing of one or more software objects that contain information related to the provisioning of the resources by cloud environment 100 for application cloud environment configuration 110 (e.g., number of servers to launch in each tier of the N-tiers, configurations of firewalls for security, middleware requirement data, required dependent application data). In some embodiments, the sending of cloud environment initialization event 210 to cloud environment 100 may comprise an application programming interface (API) call, or a set of multiple API calls.
Cloud environment 100 may contain one cloud configuration, or several cloud configurations that collectively provide application cloud environment configuration 110. Referring to
Each individual cloud configuration may contribute all, a portion, or none of each individual tier of the N-tier configuration of application cloud environment configuration 110. For example, an embodiment of application cloud environment configuration 110 may include an application tier that contains servers (e.g., virtual servers, physical servers) from cloud configurations 111 and 112, and a database tier that contains servers from cloud configurations 112-115. In another exemplary embodiment, all N tiers of application cloud environment configuration 110 may contain servers from each of the M cloud configurations.
Embodiments of the present disclosure may also include cloud environment initialization event 210 sent to cloud environment 100 by system 10. In the embodiment depicted in
Cloud environment initialization event 210 may be configured based on a requested initial cloud environment, which in turn may be determined based on user-defined provisioning information. The requested initial cloud environment may represent a cloud environment configuration suitable for the user-defined provisioning information. Cloud environment initialization event 210 may be configured to cause such a cloud environment to be made available. In some embodiments of the present disclosure, the user-defined provisioning information may be determined using user input received from a user interface. In some embodiments, user input can be provided by another computer system. Examples of information that may comprise the user-defined provisioning information include geographic preference (e.g., geographic restriction of locations for data and/or applications), service level requirements (e.g., availability), pricing information, tier definitions (e.g., number of tiers, computational resources needed for each tier, security needs for each tier), security requirements (e.g., data encryption requirements), audit/backup requirements (e.g., frequency of backup, data retention specifications), and special monitoring/alert requests (e.g., alert when a firewall rule is breached, alert when average CPU utilization reaches or exceeds a threshold value for a given time in a given tier).
In some embodiments, a configuration input file may comprise all or a portion of the user-defined provisioning information. The configuration input file data may be stored in memory, or may be stored on another storage medium. The configuration input file may facilitate modularity and the sharing of information between modules. In some embodiments, a needs analysis algorithm may be applied to the user input to generate a configuration input file.
In some embodiments, the configuration input file may be in the format of an industry-standard software language. An example of a configuration input file written in XML (Extensible Markup Language) is presented in the Appendix appearing at the end of the present disclosure.
In some embodiments of the present disclosure that generate a configuration input file based on user input received from a user interface, the configuration input file may be copied and stored for reuse. Subsequent identical configurations of cloud environment initialization event 210 may be configured by utilizing the stored configuration input file, thereby eliminating the need to collect user input from a user interface for repeated identical configurations of cloud environment initialization event 210. In some embodiments, the stored configuration input files may be modified. In some embodiments, the configuration input files may be generated without the use of a user interface (e.g., a configuration input file may be written by a user in an industry-standard language).
Cloud environment initialization event 210 may be configured to cause application cloud environment configuration 110 to be made available for executing an application. The N-tier configuration of application cloud environment configuration 110 may be made available based on the configuration of cloud environment initialization event 210.
Cloud environment initialization event 210 may be configured to optimize the configuration of application cloud environment configuration 110 based on criteria such as, for example, geographic preferences and dependencies, service level agreement (SLA) data, cloud provider preference, and collected cloud provider performance data (e.g., quality of service data). Service level agreement data may include, for example, a user's desired service level (e.g., geographic redundancy, system availability) and the service level required for each cloud provider (e.g., monitored cloud provider performance compared to cloud provider specifications).
Referring again to the embodiment depicted in
In some embodiments, the computer usable code defining the application may not be present within cloud environment 100 after completion of the lifecycle of the application. For example cloud environment 100 may initially not contain computer-usable code defining the application, which may subsequently be sent as part (or all) of application data 220 to cloud environment 100 to facilitate execution of the application within application cloud environment configuration 110. After execution of the application is completed, the resources of application cloud environment configuration 110 may be returned to cloud environment 100, and the computer-usable code defining the application may be removed from cloud environment 100 (e.g., after the lifecycle of the application is complete, the virtual environment provided by application cloud environment configuration 110 and the instance of the computer-usable code defining the application that was sent as part of application data 220 are removed).
In some embodiments, the computer-usable code defining the application (that may be sent as part or all of application data 220), may be configured to be executed in a non-cloud computing environment. In these embodiments, the computer-usable code may execute within application cloud environment configuration 110 without being modified or optimized for use in a cloud computing environment. In other words, some embodiment allow the customization of application cloud environment configuration 110 to match the required environment for an existing configuration of an application. Therefore the reconfiguring of the application or the use of additional middleware to accommodate the use of the application within application cloud environment configuration 110 may not be required.
For example, system 10 and application cloud environment configuration 110 may be configured to execute a version of an application that was previously configured and/or optimized for execution in a user's existing conventional physical computer environment. System 10 may facilitate the use of such an application by causing application cloud environment configuration 110 to be provided that substantially matches the user's existing conventional physical computer environment for which the application was configured and/or optimized.
The communication of the application's input and output data of some embodiments of the present disclosure is depicted by application input/output 250 and application input/output 251. In some embodiments, application input/output 250 may be communicated between the application executing within application cloud environment configuration 110 and system 10. In some embodiments, application input/output 251 may be communicated between the application executing within application cloud environment configuration 110 and application end user 309 that is not a user of system 10.
Continuing with the embodiment of
Some embodiments of the present disclosure may include predictive forecasting of an optimal cloud environment for future execution of the application based on monitoring data 230. Predictive forecasting of an optimal cloud environment may be performed using techniques such as, for example, neural networks, time-series algorithms, and regression analysis to predict resources needed in future time forecast periods (e.g., the next 10 minutes, hour, day, week, month, next quarter, year). The forecasting algorithms employed may be refined and updated as additional data becomes available.
In some embodiments, predictive forecasting of a future cost associated with executing the application may be performed based on monitoring data 230. For example, information from predictive forecasting of an optimal cloud environment and current pricing/billing information may be used to predict future costs associated with executing the application for various time periods (e.g., the forecasted bill at the end of the next month).
Referring again to the embodiment of
Referring also to
In the embodiment depicted in
Cloud environment adjustment event 240 may be configured based on a requested adjusted cloud environment, which in turn may be determined based on monitoring data 230. In some embodiments of the present disclosure, the requested adjusted cloud environment may be determined using monitoring data 230 to optimize the configuration of application cloud environment configuration 110 based on criteria such as, for example, geographic preferences and dependencies, SLA data, cloud provider preference, and collected cloud provider performance data (e.g., quality of service data). For example, if monitoring data 230 indicates that one cloud provider is not meeting required service levels (e.g., SLA-defined criteria), a requested adjusted cloud environment may be determined that represents a cloud environment that addresses the deficiency by replacing the deficient cloud provider with a different cloud provider. Based on the requested adjusted cloud environment, cloud environment adjustment event 240 may be configured to cause an adjustment of application cloud environment configuration 110 that replaces a cloud configuration provided by the deficient cloud provider with a newly instantiated cloud configuration from the different cloud provider.
In the embodiment of
In one embodiment, user interface device 410 is referred to broadly and is intended to encompass a suitable processor-based device such as a desktop computer, a laptop computer, a Personal Digital Assistant (PDA), a mobile communication device or organizer device having access to network 408. System 10 may be configured such that user interface software (e.g., graphical user interface software) may be used in conjunction with user device 410.
Network 408 may facilitate communications of data between server 402 and user interface device 410. Network 408 may also facilitate communications of data between server 402 and the cloud computing environment. Network 408 may include any type of communications network including, but not limited to, a direct PC to PC connection, a local area network (LAN), a wide area network (WAN), a modem to modem connection, the Internet, a combination of the above, or any other communications network now known or later developed within the networking arts which permits two or more computers to communicate, one with another.
System 10 also may include Random Access Memory (RAM) 508, which may be SRAM, DRAM, SDRAM, or the like. Computer system 500 may utilize RAM 508 to store the various data structures used by a software application configured to manage a cloud computing environment for use by a software application. System 10 may also include Read Only Memory (ROM) 506 which may be PROM, EPROM, EEPROM, or the like. The ROM may store configuration information for booting the computer system 500. The RAM 508 and the ROM 506 may hold user and system 10 data.
System 10 may also include input/output (I/O) adapter 510, communications adapter 514, user interface adapter 516, and display adapter 522. I/O adapter 510 and/or user interface adapter 516 may, in certain embodiments, enable a user to interact with the computer system 500 in order to input information for authenticating a user, identifying an individual, or receiving health profile information. In a further embodiment, the display adapter 522 may display a graphical user interface associated with a software or web-based application for managing a cloud computing environment.
The I/O adapter 510 may connect to one or more storage devices 512, such as one or more of a hard drive, a Compact Disk (CD) drive, a floppy disk drive, and a tape drive. Communications adapter 514 may be adapted to couple computer system 500 to a network, which may be, for example, one or more of a LAN, a WAN, and the Internet. The user interface adapter 516 may couple user input devices, such as keyboard 520 and pointing device 518. The display adapter 522 may be driven by CPU 502 to control display on display device 524.
The present embodiments are not limited to the architecture of
Some embodiments of the present disclosure include a computer readable medium having computer usable program code executable to perform operations for managing a cloud computing environment for use by a software application. Computer readable media includes any physical medium that can store or transfer information. Such embodiments may be characterized as tangible computer readable media having (or encoded with) computer usable (e.g., machine readable) instructions for performing certain step(s), including but not limited to hard drive media, optical media, RAM, SRAM, DRAM, SDRAM, ROM, EPROM, EEPROM, tape media, cartridge media, flash memory, memory stick, and/or the like.
Some embodiments may include a first computer readable medium having a first computer usable program code executable to install second computer usable program code on a second computer readable medium, where the second computer usable program code is executable to perform operations for managing a cloud computing environment for use by a software application. Referring to
An embodiment of a method for managing a cloud computing environment for use by a software application is depicted in the operational flow diagram of
The operational flow diagram of
The following example is included to demonstrate a particular embodiment of the present disclosure. It should be appreciated by those of skill in the art that the techniques disclosed in this example represent techniques designed to function well in the practice of the present disclosure. However, those of skill in the art should, in light of the present disclosure, appreciate that many changes can be made in the specific embodiments which are disclosed and still obtain a like or similar result without departing from the scope of the disclosed embodiments. For example, it will be appreciated that some of the described modules may be added or omitted. It will also be appreciated that some of the described functionality of the exemplary modules may be performed by other modules, or may be omitted. One of skill in the art with the benefit of the present disclosure will appreciate that embodiments of the present disclosure may contain many different design choices addressing, for example, the choice and arrangement of functionality performed by the modules.
The modules described herein may be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices.
Modules may also be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
Referring to
User Interface Processing Module
The User Interface Processing Module can capture user input and needs (e.g., how many servers, what type of servers, geographic restrictions, and minimum/max server limits for each tier, server size) and enter the data in an application database for use by various engine modules. The User Interface Processing Module allows the user to specify deployment related requirements at a high level (e.g., type of application, need for geographic redundancy, need to encrypt data, need for high availability), and creates a deployment configuration accordingly that can later be further customized and edited.
Provisioning and Deployment Management Module
The Provisioning and Deployment Management Module is responsible for provisioning the servers and ensuring the deployment rules are followed (e.g., quantity of servers to launch in each tier, firewall configuration used, etc.). The module can leverage a plug-in module for provisioning servers in various clouds (public or private). In addition the module can get input from a Deployment Optimization Module directed to the optimal provisioning of the servers.
Life Cycle State Management Module
The Life Cycle State Management Module manages the state of the application that executes in the cloud environment. This module can be a state machine that gets data for each application (e.g., each application or service) from the Monitoring Module.
The module can maintain the states of the application for each tier and overall state (e.g., deployment state, pending state, normal running state, warning state, update servers, optimization state, error state, scale up state, scale down state, shut down state). For example, if the monitoring module determines that the average utilization of servers' CPU, memory, and/or I/O utilization is over 90% in the database tier, it may generate a scale up event. The Life Cycle State Management Module may pick up the event and proceed to issue an event to add additional servers in the database tier. The Provisioning and Deployment Management Module may pick up the event and instantiate a new instance of a server in the database tier. After the new server is instantiated, the Provisioning and Deployment Management Module may issue a completion event and the Runtime Configuration Management Module can process the event and generate a event for performing post server instantiation operations, e.g. configuration file changes, service starts etc. The Runtime Configuration Management Module can receive the event, perform the task and place the task completion event for the Life Cycle State Management Module queue so that the state of the application can be updated.
The Life Cycle State Management Module should also be able to handle virtual server instance level failures similar to scale up/scale down events. The module may be able to deal with instance level failure.
Deployment Optimization Module
The Deployment Optimization Module is responsible for collecting and maintaining, for example, SLA data, pricing data, and quality of service data from different cloud providers. Prior to provisioning the resources, the Provisioning and Deployment Management module may call the Deployment Optimization Module. The deployment optimization module can use the application/service configuration information, user inputs (e.g. geographic dependencies, provider preference, SLA requirements and the actual collected data from various cloud providers) to recommend the optimal cloud configuration.
Runtime Configuration Management Module
This Runtime Configuration Management Module can perform the tasks of updating configuration files on running servers, starting or stopping applications on the virtual servers, and installing software upgrades and patches on the virtual servers. This module can have several libraries of best practice configuration templates for various types of software packages. Depending on the event, the module can dynamically create configuration files from templates and apply appropriate changes to the server(s). Upon completion of the tasks, the module may puts a message on the queue for the Life Cycle State Management Module.
Load Forecasting Module
The Load Forecasting Module can use the monitoring data from the Monitoring Module and the collected cloud provider data to forecast the load (e.g. number of servers or amount of resources that would be needed in the future to optimally run the application without degrading the quality of service). The Load Forecasting Module may operate in conjunction with the Deployment Optimization Module. The Load Forecasting Module may generate messages which will be processed by the Life Cycle State Management Module and the Pricing Module.
Pricing Module
The Pricing Module may process messages from the Monitoring Module and the Life Cycle State Management Module and, in combination with the output of the Load Forecasting Module, compute current pricing and forecast future pricing. Memory, CPU, Disk Usage, Bandwidth, along with SLAs, and backend provider cost information may be used as a part of the input for computing current pricing and forecasting future pricing. Credits received from cloud providers (e.g., for failure to meet SLA levels) may also be accounted for. The pricing module may have the ability to forecast the pricing of the cloud computing infrastructure used by any specific application/service or group of applications/services on a daily, weekly, quarterly, and/or yearly basis, thereby facilitating accurate budget forecasting by the users of the application. The prediction interval of the pricing can be customized for each account.
Audit/Reporting Module
The Audit/Reporting Module may track relevant events in the system and facilitate displaying, generating, and emailing various reports and audit logs to the proper party based on user role. The module may also the HA Scheduler to automate the process of creating and sending reports to users at a scheduled time.
Plug-Ins for Multiple Providers
These are set of libraries for APIs for connecting to various cloud providers. These libraries may also have APIs for connecting directly to virtualization providers. The purpose of the module is to provide a collection of plug-in APIs such that the details of obtaining resources for running application and services are abstracted from the provisioning module. The Provisioning and Deployment Management Module may leverage the plug-ins for provisioning servers in various environments.
Monitoring Module
The Monitoring Module may contain components for processing the monitoring data and generating appropriate events, and for collecting data from various virtual servers. The data collection component of the monitoring module may be pluggable such that any external monitoring system can be integrated with the application to collect data. The Monitoring Module may leverage both agent and agent-less monitoring.
Security Module
The Security Module may receive various security related information (e.g., firewall access reports for the virtual servers, breaches). The Security Module may provide a central processing unit for receiving security related information for various software component and services. For example, an external firewall scanner/monitor can send messages to the Security Module and in response the Security Module may process the information and generate appropriate events (e.g., shutdown server, security breach event for sending alerts/notification).
Alert/Notification Processing Module
The Alert/Notification Processing Module may process various events from various modules and be responsible for delivering user notification via different means (e.g., email, SMS, etc.).
Software Audit Module
The Software Audit Module may provide information about the version of software deployed on various servers. The module may have two components: one to audit the virtual machines that are currently running, and the other to audit the virtual machine images. The audit reports may be organized in application/service context to inform the user of the version of various software components deployed on the servers that are executing the specified application/s or service/s.
14-Virtual Machine Image Processing Module
This module may be provided to leverage the OVF standards to simplify movement and deployment of Virtual appliances and servers to different backend environments.
Access Control Module
The Access Control Module may be responsible for maintaining all the access control rules (e.g. access to root access to a virtual server; access to start/stop servers and applications/services; access to view specific data). Various modules may leverage the Access Control Module for checking user permissions for specific tasks.
HA Scheduler
The Highly Available Scheduler may provide a resilient scheduling mechanism. The HA Scheduler solution may be provided by, for example, a J2EE container.
HA Queuing
The Highly Available Queuing solution for receiving and delivering messages may be provided by, for example, a J2EE cluster.
Some (up to all) of the steps described in the sections above may be implemented using a computer having a processor (e.g., one or more integrated circuits) programmed with firmware and/or running software. Some (up to all) of the steps described in the sections above may be implemented using a distributed computing environment, which is one example of a computer system. Some (up to all) of the steps described in the sections above may be implemented using a virtual computer system (a virtual machine), where the virtual computer environment does not have a one-to-one correspondence with a physical computer environment.
Descriptions of well known assembly techniques, components, and equipment have been omitted so as not to unnecessarily obscure the present methods, apparatuses, an systems in unnecessary detail. The descriptions of the present methods and apparatuses are exemplary and non-limiting. Certain substitutions, modifications, additions and/or rearrangements falling within the scope of the claims, but not explicitly listed in this disclosure, may become apparent to those of ordinary skill in the art based on this disclosure.
The appended claims are not to be interpreted as including means-plus-function limitations, unless such a limitation is explicitly recited in a given claim using the phrase(s) “means for” and/or “step for,” respectively.
APPENDIX
Example Configuration File
<?xml version=“1.0” encoding=“utf-8” ?>
<system>
<name>cloudondemand</name>
<version>2</version>
<modelManagement>
<geopreference>
<geoid>Europe<geoid>
<preferencerank>1<preferencerank>
<geopreference/>
<servicelevelreq>
<slaid>99.999<slaid>
<preferencerank>2<preferencerank>
<servicelevelreg/>
<pricingpreference>
<preferencerank>3<preferencerank>
<pricingpreference/>
<tier>
<id>T-001</id>
<name>web</name>
<securityGroup>apache-web-group</securityGroup>
<keypair>cloudondemand-keypair</keypair>
<tierindex>1</tierindex>
<serverTypes>
<serverType>
<id>ST-001</id>
<name>apache loadbalancer</name>
<machineIdentifier>ami-5f14f136</machineIdentifier>
<parameters>
</parameters>
<startupCount>1</startupCount>
<services>
<service>
<id>S-001</id>
<name>apache-loadbalancer-with
ssl</name>
</service>
</services>
</serverType>
</serverTypes>
</tier>
<tier>
<id>T-002</id>
<name>app</name>
<securityGroup>jboss-app-group</securityGroup>
<keypair>cloudondemand-keypair</keypair>
<tierindex>1</tierindex>
<serverTypes>
<serverType>
<id>ST-002</id>
<name>jboss cluster node</name>
<machineIdentifier>ami-5f14f136</machineIdentifier>
<parameters>
</parameters>
<startupCount>1</startupCount>
<services>
<service>
<id>S-002</id>
<name>JBossAS
</name>
<parameters>
</parameters>
</service>
</services>
</serverType>
</serverTypes>
</tier>
<tier>
<id>T-003</id>
<name>db</name>
<securityGroup>mysql-db-group</securityGroup>
<keypair>cloudondemand-keypair</keypair>
<tierindex>3</tierindex>
<serverTypes>
<serverType>
<id>ST-003</id>
<name>mysql ndbd manager</name>
<machineIdentifier>ami-5f14f136</machineIdentifier>
<parameters>
</parameters>
<startupCount>1</startupCount>
<services>
<service>
<id>S-003</id>
<name>mysql-ndbd-
manager</name>
</service>
</services>
</serverType>
<serverType>
<id>ST-004</id>
<name>mysql ndbd node</name>
<machineIdentifier>ami-5f14f136</machineIdentifier>
<parameters>
</parameters>
<startupCount>1</startupCount>
<services>
<service>
<id>S-004</id>
<name>mysql-ndbd</name>
</service>
</services>
</serverType>
<serverType>
<id>ST-005</id>
<name>mysql data node</name>
<machineIdentifier>ami-5f14f136</machineIdentifier>
<parameters>
</parameters>
<startupCount>1</startupCount>
<services>
<service>
<id>S-005</id>
<name>mysql-node</name>
</service>
</services>
</serverType>
</serverTypes>
</tier>
</modelManagement>
</system>
Mazhar, Jamal, Pervez, Muhammad Shahzad
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10268522, | Nov 30 2009 | Red Hat, Inc | Service aggregation using graduated service levels in a cloud network |
6918113, | Nov 06 2000 | NUMECENT HOLDINGS, INC | Client installation and execution system for streamed applications |
7080378, | May 17 2002 | Oracle America, Inc | Workload balancing using dynamically allocated virtual servers |
7093005, | Feb 11 2000 | Oracle America, Inc | Graphical editor for defining and creating a computer system |
7350186, | Mar 10 2003 | GOOGLE LLC | Methods and apparatus for managing computing deployment in presence of variable workload |
7380039, | Dec 30 2003 | Computer Associates Think, Inc | Apparatus, method and system for aggregrating computing resources |
7596620, | Nov 04 2008 | APPCELERATOR, INC | System and method for developing, deploying, managing and monitoring a web application in a single environment |
7720968, | Apr 30 2003 | International Business Machines Corporation | Method and system of configuring elements of a distributed computing system for optimized value |
7822594, | Aug 07 2006 | Mellanox Technologies, LTD | Service-oriented infrastructure management |
7860973, | Jun 27 2008 | Microsoft Technology Licensing, LLC | Data center scheduler |
8078728, | Mar 31 2006 | QUEST SOFTWARE INC F K A DELL SOFTWARE INC ; Aventail LLC | Capacity pooling for application reservation and delivery |
8099758, | May 12 1999 | Microsoft Technology Licensing, LLC | Policy based composite file system and method |
8108855, | Jan 02 2007 | International Business Machines Corporation | Method and apparatus for deploying a set of virtual software resource templates to a set of nodes |
8250215, | Aug 12 2008 | SAP SE | Method and system for intelligently leveraging cloud computing resources |
8271974, | Oct 08 2008 | MAZHAR, JAMAL | Cloud computing lifecycle management for N-tier applications |
8326972, | Sep 26 2008 | Red Hat, Inc.; Red Hat, Inc | Methods and systems for managing network connections in a software provisioning environment |
8402110, | Sep 28 2006 | Microsoft Technology Licensing, LLC | Remote provisioning of information technology |
8429630, | Sep 15 2005 | CA, INC | Globally distributed utility computing cloud |
8751627, | May 05 2009 | Accenture Global Services Limited | Method and system for application migration in a cloud |
8863125, | Nov 23 2010 | International Business Machines Corporation | Optimization of virtual appliance deployment |
8880678, | Jun 05 2008 | APPCELERATOR, INC | System and method for managing and monitoring a web application using multiple cloud providers |
8914768, | Mar 28 2012 | BMC Software, Inc.; BMC SOFTWARE, INC | Automated blueprint assembly for assembling an application |
8918488, | Feb 04 2009 | Citrix Systems, Inc. | Methods and systems for automated management of virtual resources in a cloud computing environment |
9037692, | Nov 26 2008 | Red Hat, Inc.; Red Hat, Inc | Multiple cloud marketplace aggregation |
9043751, | Oct 08 2008 | MAZHAR, JAMAL | Methods and devices for managing a cloud computing environment |
9086928, | Aug 31 2009 | Accenture Global Services Limited | Provisioner within cloud console—defining images of an enterprise to be operable on different cloud computing providers |
9195453, | Jun 10 2014 | International Business Machines Corporation | Remediation of known defects and vulnerabilities in cloud application packages |
9203636, | Sep 28 2001 | Level 3 Communications, LLC | Distributing requests across multiple content delivery networks based on subscriber policy |
9274811, | Feb 16 2007 | BLADELOGIC, INC | System and method for cloud provisioning and application deployment |
9413687, | Mar 16 2005 | III Holdings 12, LLC | Automatic workload transfer to an on-demand center |
9473577, | Mar 29 2011 | OS NEXUS, INC. | Dynamic provisioning of a virtual storage appliance |
9578063, | Nov 20 2015 | International Business Machines Corporation | Application self-service for assured log management in cloud environments |
9667489, | May 28 2014 | FRUITION GROWTH LLC | Generation and management of computing infrastructure instances |
20020016166, | |||
20020068554, | |||
20030065762, | |||
20030217131, | |||
20040024979, | |||
20040205691, | |||
20050102387, | |||
20050155033, | |||
20050188075, | |||
20050198629, | |||
20060047813, | |||
20060143350, | |||
20060224741, | |||
20060230149, | |||
20060239459, | |||
20060259949, | |||
20060277305, | |||
20070078960, | |||
20070078988, | |||
20070177526, | |||
20070233698, | |||
20070240160, | |||
20070248106, | |||
20080080396, | |||
20080082480, | |||
20080082600, | |||
20080123559, | |||
20080147866, | |||
20080196025, | |||
20080215450, | |||
20080235703, | |||
20090049421, | |||
20090064133, | |||
20090241104, | |||
20090276771, | |||
20090300149, | |||
20090300210, | |||
20090300635, | |||
20090319688, | |||
20100042670, | |||
20100042720, | |||
20100088205, | |||
20100131624, | |||
20100153482, | |||
20100192120, | |||
20110137805, | |||
20120239739, | |||
20140007079, | |||
20140026122, | |||
20160378450, | |||
CN101151593, | |||
CN1687917, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 27 2015 | MAZHAR, JAMAL | KAAVO, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 054699 | /0502 | |
Jun 02 2015 | PERVEZ, MUHAMMAD SHAHZAD | KAAVO, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 054699 | /0502 | |
Dec 28 2018 | KAAVO, INC | MAZHAR, JAMAL | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 055278 | /0959 | |
Dec 16 2020 | Jamal, Mazhar | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Dec 16 2020 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Aug 16 2025 | 4 years fee payment window open |
Feb 16 2026 | 6 months grace period start (w surcharge) |
Aug 16 2026 | patent expiry (for year 4) |
Aug 16 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 16 2029 | 8 years fee payment window open |
Feb 16 2030 | 6 months grace period start (w surcharge) |
Aug 16 2030 | patent expiry (for year 8) |
Aug 16 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 16 2033 | 12 years fee payment window open |
Feb 16 2034 | 6 months grace period start (w surcharge) |
Aug 16 2034 | patent expiry (for year 12) |
Aug 16 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |